Showing 54 open source projects for "unity source code"

View related business solutions
  • AI-powered SAST and AppSec platform that helps companies find and fix vulnerabilities. Icon
    AI-powered SAST and AppSec platform that helps companies find and fix vulnerabilities.

    Trusted by 750+ companies and performing 200k+ code scans monthly.

    ZeroPath (YC S24) is an AI-native application security platform that delivers comprehensive code protection beyond traditional SAST. Founded by security engineers from Tesla and Google, ZeroPath combines large language models with advanced program analysis to find and automatically fix vulnerabilities.
    Learn More
  • SOCRadar Extended Threat Intelligence Platform Icon
    SOCRadar Extended Threat Intelligence Platform

    Get real-time visibility into vulnerabilities, leaked data, and threat actor activity targeting your organization.

    SOCRadar Extended Threat Intelligence, a natively single platform from its inception that proactively identifies and analyzes cyber threats with contextual and actionable intelligence.
    Start Free Trial
  • 1
    bento-starter

    bento-starter

    Full-Stack solution to quickly build PWA applications with Vue.js

    Provides a completely well-configured environment so you can immediately focus on writing your web app code. BentoStarter uses Vue.js because it is cool, fast, and probably the easiest javascript framework to learn today. Your app is deployed to firebase hosting as soon as you commit a new version. Provides a strong PWA configuration so your web app can be used as a mobile (IOS / Android) or desktop application with offline support. BentoStarter uses firestore which provides a cloud NoSQL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    BLESS

    BLESS

    An SSH Certificate Authority that runs as an AWS Lambda function

    BLESS is an SSH Certificate Authority that runs as an AWS Lambda function and is used to sign SSH public keys. SSH Certificates are an excellent way to authorize users to access a particular SSH host, as they can be restricted for a single-use case, and can be short-lived. Instead of managing the authorized_keys of a host, or controlling who has access to SSH Private Keys, hosts just need to be configured to trust an SSH CA. BLESS should be run as an AWS Lambda in an isolated AWS account....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3

    webmongo

    Accessing server-side mongodb through client javascript API.

    Accessing server-side mongodb through client javascript API. This project is a branch of dbcloud You can do almost invoke on mongodb through the javascript API in browser. The client javascript api support IE6.0+ Chrome FireFox and Wechat
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    AWS Serverless Workshops

    AWS Serverless Workshops

    Code and walkthrough labs to set up serverless applications

    This repository contains a collection of workshops and other hands-on content that will guide you through building various serverless applications using AWS Lambda, Amazon API Gateway, Amazon DynamoDB, AWS Step Functions, Amazon Kinesis, and other services. This workshop shows you how to build a dynamic, serverless web application. You'll learn how to host static web resources with Amazon S3, how to use Amazon Cognito to manage users and authentication, and how to build a RESTful API for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
MongoDB Logo MongoDB